CN117676537A - Access control method, communication device and storage medium - Google Patents

Access control method, communication device and storage medium Download PDF

Info

Publication number
CN117676537A
CN117676537A CN202311371904.0A CN202311371904A CN117676537A CN 117676537 A CN117676537 A CN 117676537A CN 202311371904 A CN202311371904 A CN 202311371904A CN 117676537 A CN117676537 A CN 117676537A
Authority
CN
China
Prior art keywords
network
terminal
visiting
network element
home
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311371904.0A
Other languages
Chinese (zh)
Inventor
胡广金
赫罡
张欣
高功应
刘北阳
李晨仪
刘凡栋
朱晓林
马田丰
邬莎
韩军峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202311371904.0A priority Critical patent/CN117676537A/en
Publication of CN117676537A publication Critical patent/CN117676537A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/06Registration at serving network Location Register, VLR or user mobility server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides an access control method, a communication device and a storage medium, wherein the method is applied to access and mobility management function network elements of a visiting place network and comprises the following steps: receiving a registration request message sent by a terminal, wherein the registration request message carries an identifier of a home network of the terminal; if the identifier of the home network does not exist in the home network list of the networking mode which does not support the visiting network, sending a discovery request message to a network storage function network element of the visiting network roaming gateway; receiving a discovery response message returned by the network storage function network element, wherein the discovery response message is used for indicating a networking mode that the home network does not support the visiting network; and adding the home network to a home network list of a networking mode which does not support the visiting network according to the discovery response message, and returning a registration rejection message to the terminal. The method reduces the useless communication signaling quantity, improves the communication index and the communication performance, and improves the user experience.

Description

Access control method, communication device and storage medium
Technical Field
The present invention relates to communication technologies, and in particular, to an access control method, a communication device, and a storage medium.
Background
Currently, a fifth generation mobile communication technology (5th Generation Mobile Communication Technology,5G) is large-scale networking, and a 5G network in the initial stage of networking mainly adopts independent networking (SA) +non-independent Networking (NSA) dual-mode architecture networking.
In the roaming scenario, a scenario may occur in which the visited network builds and opens the SA network, while the home network does not build the SA network, or closes the SA network. Only the home location and the visiting location are built and the SA networking is opened, and the 5G terminal (such as a mobile phone, a tablet and the like, hereinafter referred to as SA/NSA terminal) supporting the SA network and the NSA network can access the SA network of the visiting location, so that 5G communication is realized. However, if the visited place supports the SA network, the SA/NSA terminal will still attempt to access the visited place SA network, although the home place does not support the SA network, although eventually it will end up failure.
At present, when the home location of the terminal is a non-SA network and the visiting location supports an SA network, the SA/NSA terminal has communication signaling redundancy in the process of attempting to register to the visiting location SA network, occupies excessive communication resources, further has unnecessary influence on network indexes and performance, and has poor user experience.
Disclosure of Invention
The application provides an access control method, a communication device and a storage medium, which are used for solving the problems that when the home location of a terminal is a non-SA network and a visiting location supports an SA network, communication signaling redundancy exists in the process of attempting to register to the visiting location SA network by an SA/NSA terminal, excessive communication resources are occupied, network indexes and performance are further unnecessarily influenced, and user experience is poor.
In a first aspect, the present application provides an access control method, where the method is applied to an access management network element of a visited network, the method includes:
receiving a registration request message sent by a terminal, wherein the registration request message carries an identifier of a home network of the terminal; the terminal supports a networking mode of the visiting place network;
if the identifier of the home network does not exist in the home network list which does not support the networking mode of the visiting network, sending a discovery request message to a network storage network element of the visiting network roaming gateway, wherein the discovery request message carries the identifier of the home network;
receiving a discovery response message returned by the network storage network element, wherein the discovery response message is used for indicating that the home network does not support the networking mode of the visiting network;
And adding the home network to a home network list of a networking mode which does not support the visiting network according to the discovery response message, and returning a registration rejection message to the terminal.
Optionally, the method further comprises:
and if the identifier of the home network exists in the home network list which does not support the networking mode of the visiting network, returning a registration rejection message to the terminal.
Optionally, the registration rejection message carries indication information, where the indication information is used to instruct the terminal to stop initiating a registration request to the visited network.
Optionally, the method further comprises:
sending a subscription request to the network storage network element, wherein the subscription request is used for requesting to subscribe the change information of the networking mode of the home network supporting the visiting network;
and if a subscription response returned by the network storage network element is received, deleting the home network from the home network list of the networking mode which does not support the visiting network, wherein the subscription response carries the change information.
In a second aspect, the present application provides an access control method, where the method is applied to an access management network element of a visited network, the method includes:
Receiving a registration request message sent by a terminal, wherein the registration request message carries an identifier of a home network of the terminal; the terminal supports a networking mode of the visiting place network;
sending a discovery request message to a network storage network element of the visiting network, wherein the discovery request message carries an identifier of the home network;
receiving a discovery response message returned by the network storage network element, wherein the discovery response message is used for indicating that the home network does not support the networking mode of the visiting network;
returning a registration rejection message to the terminal according to the discovery response message; the registration rejection message carries indication information, and the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network.
In a third aspect, the present application provides an access control method, where the method is applied to a terminal, and the terminal supports a networking manner of a visited network, and the method includes:
sending a registration request message to an access management network element of a visiting place network, wherein the registration request carries an identifier of a home network of the terminal;
receiving a registration rejection message returned by the access management network element; the registration rejection message carries indication information, wherein the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network;
And stopping initiating a registration request to the visiting place network according to the indication information.
In a fourth aspect, the present application provides an access control method, the method being applied to a network storage network element of a visited network, the method comprising:
receiving a discovery request message sent by an access management network element of the visiting place network, wherein the discovery request message is triggered when the access management network element receives a registration request message sent by a terminal, the discovery request message carries an identifier of a home network of the terminal carried in the registration request message, and the terminal supports a networking mode of the visiting place network;
determining whether the home network supports a networking mode of the visiting network;
and if not, returning a discovery response message to the access management network element, wherein the discovery response message is used for indicating that the home network does not support the networking mode of the visiting network.
Optionally, the method further comprises:
receiving a subscription request sent by the access management network element, wherein the subscription request is used for requesting to subscribe to change information of a networking mode of the home network supporting the visitor network;
And when the home network supports the networking mode of the visiting network, sending a subscription response to the access management network element, wherein the subscription response is used for indicating the change information.
In a fifth aspect, the present application provides an access control device, where the access control device is applied to an access management network element of a visited network, the device includes:
a first receiving module, configured to receive a registration request message sent by a terminal, where the registration request message carries an identifier of a home network of the terminal; the terminal supports a networking mode of the visiting place network;
a sending module, configured to send a discovery request message to a network storage network element of a visited network roaming gateway if the identifier of the home network does not exist in a home network list that does not support a networking manner of the visited network, where the discovery request message carries the identifier of the home network;
a second receiving module, configured to receive a discovery response message returned by the network storage network element, where the discovery response message is used to indicate that the home network does not support a networking manner of the visited network;
and the adding module is used for adding the home network to a home network list of a networking mode which does not support the visiting network according to the discovery response message, and returning a registration rejection message to the terminal.
In a sixth aspect, the present application provides an access control apparatus, the apparatus being applied to an access management network element of a visited network, the method comprising:
a first receiving module, configured to receive a registration request message sent by a terminal, where the registration request message carries an identifier of a home network of the terminal; the terminal supports a networking mode of the visiting place network;
a sending module, configured to send a discovery request message to a network storage network element of the visited network, where the discovery request message carries an identifier of the home network;
a second receiving module, configured to receive a discovery response message returned by the network storage network element, where the discovery response message is used to indicate that the home network does not support a networking manner of the visited network;
a return module, configured to return a registration rejection message to the terminal according to the discovery response message; the registration rejection message carries indication information, and the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network.
In a seventh aspect, the present application provides an access control apparatus, where the apparatus is applied to a terminal, and the terminal supports a networking manner of a visited network, and the apparatus includes:
A sending module, configured to send a registration request message to an access management network element of a visited network, where the registration request carries an identifier of a home network of the terminal;
a receiving module, configured to receive a registration rejection message returned by the access management network element; the registration rejection message carries indication information, wherein the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network;
and the initiating module is used for stopping initiating the registration request to the visiting place network according to the indication information.
In an eighth aspect, the present application provides an access control apparatus, the apparatus being applied to a network storage network element of a visited network, the apparatus comprising:
a receiving module, configured to receive a discovery request message sent by an access management network element of the visited network, where the discovery request message is triggered when the access management network element receives a registration request message sent by a terminal, where the discovery request message carries an identifier of a home network of the terminal carried in the registration request message, and the terminal supports a networking manner of the visited network;
a determining module, configured to determine whether the home network supports a networking manner of the visited network;
And the return module is used for returning a discovery response message to the access management network element if the network access management network element does not support the network access mode, wherein the discovery response message is used for indicating that the home network does not support the network access mode of the visiting network.
In a ninth aspect, the present application provides a communication device comprising:
a processor, and a memory and a communication interface which are in communication connection with the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of the first aspect, or the second aspect, or the third aspect, or the fourth aspect.
In a tenth aspect, the present application provides a computer-readable storage medium having stored therein computer-executable instructions for implementing the access control method according to any of the first, or second, or third, or fourth aspects when executed by a processor.
In an eleventh aspect, the present application provides a computer program product comprising a computer program which when executed by a processor implements the method of the first aspect, or the second aspect, or the third aspect, or any of the fourth aspect.
The access control method, the communication device and the storage medium provided by the application comprise the steps that firstly, a terminal sends a registration request message to a visiting place access management network element; then, the access management network element judges whether the identification of the home network exists in a home network list of a networking mode which does not support the visiting network; if not, the access management network element sends a discovery request message to the network storage network element of the visit area network diffuse access gateway; subsequently, the network storage network element determines whether the home network supports the networking mode of the visiting place network, if not, the network storage network element returns a discovery response message to the access management network element; subsequently, the access management network element adds the home network to a home network list of a networking mode which does not support the visiting network according to the discovery response message, and returns a registration rejection message to the terminal.
Because the visiting place access management network element stores the home network list of the networking mode which does not support the visiting place network, when the terminal tries to register to the visiting place network, the access management network element can directly judge whether the terminal has qualification of registering to the visiting place network according to the list, namely, whether the home place of the terminal supports the target network. And when the home location of the terminal exists in the home network category of the networking mode which does not support the visiting place network, the registration rejection message can be directly fed back to the terminal without executing communication signaling transmission between the visiting place access management network element and the visiting place diffuse access gateway. That is, by the method, when the terminal belongs to the area without supporting the visiting area network and tries to access the visiting area network, unnecessary transmission of communication signaling is reduced, occupation of communication resources is further reduced, influence on communication indexes and communication performance is reduced, and user experience is further improved.
In addition, the configuration of the visited place access management network element is not realized in a manual configuration mode, but the configuration of the home network list of the home network which does not support the networking mode of the home network is directly and automatically realized through the visited place access management network element according to the discovery response message sent by the visited place diffuse entry gateway, so that the waste of human resources caused by manually configuring the visited place access management network element can be avoided in the mode, and the operation is simple, convenient and quick.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a network architecture diagram according to an embodiment of the present application;
fig. 2 is a schematic flow chart of an access control method provided in the prior art;
fig. 3 is a flow chart of a first access control method provided in the present application;
fig. 4 is a flow chart of a second access control method provided in the present application;
fig. 5 is a flow chart of a third access control method provided in the present application;
fig. 6 is a schematic structural diagram of a first access control device provided in the present application;
Fig. 7 is a schematic structural diagram of a second access control device provided in the present application;
fig. 8 is a schematic structural diagram of a third access control device provided in the present application;
fig. 9 is a schematic structural diagram of a fourth access control device provided in the present application;
fig. 10 is a schematic structural diagram of a communication device 100 provided in the present application.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
The terms referred to in this application are explained first:
roaming (roaming): refers to a function that a communication system can provide services to a terminal after the terminal leaves a service area (i.e., home location) registered by the terminal and moves to another service area (i.e., visiting location). Currently, roaming can only be performed between regions where the network system is compatible and already networked or regions where bilateral roaming agreements have been signed. User roaming involves two concepts, one being roaming in and one being roaming out, which is a set of corresponding concepts. The roaming-in refers to that the terminal in other areas roams to the local area, and the roaming-out refers to that the number in the local area roams to other areas.
Gateway bureau: commonly referred to as gateway mobile switching centers (Gateway Mobile Switching Center, GMSCs), function primarily as tandem. Such as a carrier, or a relay interconnect between different communication networks, is connected through a gateway. The gateway office is the office point of entry and exit into the network. In the roaming scene, the terminal accesses to the visiting place network through the roaming gateway.
Fig. 1 is a network architecture diagram according to an embodiment of the present application. For example, as shown in fig. 1, a 5G network architecture promulgated by the third generation partnership project (3rd Generation Partnership Project,3GPP) standard group includes: an access network device, an access and mobility management function (access and mobility management function, AMF) network element, a session management function (session management function, SMF) network element, a unified data management function (unified data management, UDM) network element, an authentication service function (Authentication Server Function, AUSF) network element, a network storage function (Network Repository Function, NRF) network element.
Those skilled in the art will appreciate that the network architecture shown in fig. 1 is not limiting and that in a particular implementation, the network architecture may include more or fewer network elements than shown, or some combination of network elements, etc. It should be understood that the network architecture diagram shown in fig. 1 may be any communication network architecture diagram, for example, a 5G network architecture diagram, or a schematic diagram of an architecture of a communication network that appears in the future.
In the above network architecture, the access network device is a device at the access network side, and the AMF network element, the SMF network element, the UDM network element, the AUSF network element, and the NRF network element are network elements at the core network side (abbreviated as core network element).
The AMF network element is used for managing whether the terminal equipment can access the core network. The SMF network element is used for managing session connection established by the terminal equipment through the core network, and each session connection is used for transmitting user plane data of the terminal equipment. The UDM network element is configured to store subscription data of the terminal. The AUSF network element is used for receiving the request of the AMF network element for carrying out the identity verification on the UE, and forwarding the key issued by the UDM to the AMF for carrying out the authentication processing by requesting the key from the UDM. The NRF network element is used for registering, managing and detecting the state of the network element, and realizing the automatic management of all the network elements. The technical scheme provided by the embodiment of the application can be applied to various communication systems, for example: the embodiments of the present application are not limited to a long term evolution (long term evolution, LTE) system, a fifth generation (5th generation,5G) mobile communication system, a wireless-fidelity (WiFi) system, a frequency division duplex (frequency division duplex, FDD) system, a future communication system, or a system in which multiple communication systems are integrated, and the like. Wherein 5G may also be referred to as New Radio (NR).
The technical scheme provided by the embodiment of the application can be applied to various communication scenes, for example, one or more of the following communication scenes: enhanced mobile bandwidth (enhanced mobile broadband, eMBB) communication, high reliability low latency communication (ultra-reliable and low latency communication, URLLC), machine type communication (machine type communication, MTC), emtc, device-to-device (D2D) communication, vehicle-to-vehicle (vehicle to everything, V2X) communication, vehicle-to-vehicle (vehicle to vehicle, V2V) communication, and internet of things (internet of things, ioT), among others. Optionally, mctc may include one or more of the following communications: communication of industrial wireless sensor networks (industrial wireless sensor network, IWSN), communication in video surveillance (video surveillance) scenarios, and communication of wearable devices, etc.
A terminal in an embodiment of the present application may also be referred to as a User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a terminal device, a wireless communication device, a user agent, or a user equipment. The terminals in embodiments of the present application may be cell phones, tablet computers, computers with wireless transceiving functionality, virtual Reality (VR) terminal devices, augmented reality (augmented reality, AR) terminal devices, wireless terminals in industrial control, wireless terminals in unmanned, wireless terminals in telemedicine, wireless terminals in smart grids, wireless terminals in transportation security, wireless terminals in smart cities, wireless terminals in smart homes, cellular phones, cordless phones, session initiation protocol (session initiation protocol, SIP) phones, wireless local loop (wireless local loop, WLL) stations, personal digital assistants (personal digital assistant, PDAs), handheld devices with wireless communication functionality, computing devices, vehicle devices, wearable devices, terminal devices in 5G networks or terminal devices in future evolved public land mobile communication networks (public land mobile network, PLMN), etc. It should be understood that the present application is not limited to a specific form of terminal.
The network device in the embodiment of the application may be a device with a wireless transceiver function in an access network. The apparatus includes, but is not limited to: a base station, evolved node B (eNB), a radio network controller (radio network controller, RNC), a Node B (NB), a base station controller (base station controller, BSC), a base transceiver station (base transceiver station, BTS), a home base station (e.g., home evolved nodeB, or home node B, HNB), a baseband unit (BBU), an Access Point (AP) in a wireless fidelity (wireless fidelity, WIFI) system, a wireless relay node, a wireless backhaul node, a transmission point (transmission point, TP), or a transmission reception point (transmission and reception point, TRP), and so on. The device may also be a network node constituting a next generation base station (the next Generation Node B, gNB) or a transmission point, such as a baseband unit (BBU), or a Distributed Unit (DU), etc.
Currently, there are two networking modes for 5G networks, one is SA and one is NSA. NSA means that 5G networking is installed on 4G infrastructure, and base station side 4G base station and 5G base station coexist. Whether the network is used by a non-independent networking or a 4G core network is simply added with a 5G base station, so that the 5G end user can enjoy the broadband capability. The SA is to build an independent 5G base station to implement networking, and a 5G core network (i.e., a 5G network architecture published by a 3GPP standard group) needs to be completely newly built for use.
In the process of advancing the 5G technology, some areas build and start the SA network, while some areas do not build or start the SA network, for example, only the NSA network, or the fourth generation mobile communication technology (the 4th generation mobile communication technology,4G) network is built. In roaming scene, only if the terminal is SA/NSA terminal, and the home location of the terminal builds and starts SA network, the visiting location builds and starts SA network, the terminal can access SA network in the visiting location, and 5G communication is realized.
When the SA/NSA terminal of the home non-SA network tries to access the visiting place network, if the visiting place network supports the SA network, the SA/NSA terminal can register with the visiting place SA network preferentially. Fig. 2 is a flow chart of an access control method provided in the prior art, as shown in fig. 2, in the process of attempting to access a visited SA network, an SA/NSA terminal first sends a registration request message to an AMF network element of the visited place through a 5G base station. The visited AMF network element sends a discovery request message to the NRF network element of the visited diffuse entry gateway to request discovery of an AUSF network element for authenticating the registration authority of the terminal. Subsequently, the NRF network element of the visitor diffused gateway performs a home public land mobile network (Public Land Mobile Network, PLMN) discovery procedure to attempt to discover the AUSF network element.
Because the home location of the SA/NSA terminal does not support the SA network, the NRF network element of the visiting location roaming gateway is not configured with the home location NRF network element address, namely the AUSF network element for authenticating the registration authority of the terminal cannot be found through the home location NRF network element. At this time, the NRF network element of the visited place diffuse entry gateway feeds back a discovery request response to the visited place AMF network element to characterize that the discovery result is null, i.e. the AUSF network element cannot be discovered. After receiving the discovery request response, the visiting AMF network element sends a registration rejection message to the SA/NSA terminal through the 5G base station so as to reject the registration request of the terminal. Subsequently, if the visited network supports other networks, the terminal will attempt to access other networks, e.g. 4G networks.
However, since the visited place supports the SA network, the SA/NSA terminal can always search for the visited place SA network signal. At this time, even if access has been denied, after a while, the terminal may repeatedly attempt to access the visited SA network and still may fail registration. This iterative registration process will cause redundancy in communication signaling, which can have an unnecessary impact on network metrics and communication performance, as well as impact on user experience.
In the prior art, the appointed home network terminal is set in the visiting place AMF network element to not allow access, namely if the home terminal supporting the SA network sends a registration request message to the visiting place AMF network element, the visiting place AMF network element terminal can terminate the registration request of the roaming terminal. However, the existing configuration mode needs to manually set the global AMF network element, and is complex in operation.
The inventor considers that if the number of communication signaling in the repeated registration process of the terminal can be reduced, or the repeated registration of the terminal is avoided, the influence on network indexes and communication performance can be reduced, and the user experience is improved.
In view of this, the present application provides an access control method, where when a terminal belongs to a place where an SA network is not supported and a visiting place where an SA network is supported, a flow of registering the terminal to the visiting place SA network is controlled by an AMF network element end of the visiting place and/or the terminal, so as to reduce communication signaling in a repeated registration process of the terminal, or avoid the repeated registration process of the terminal. By the method, the number of redundant communication signaling can be reduced, so that the influence on communication indexes and communication performance is reduced, and the user communication experience is improved.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings. It should be understood that the access control method provided in the present application may be applied to access control of an SA network, and may also be applied to access control of any other network, for example, a future network.
Fig. 3 is a flow chart of a first access control method provided in the present application, as shown in fig. 3, the method may include the following steps:
s101, the terminal sends a registration request message to a visiting place access management network element.
The terminal here may be, for example, any SA/NSA terminal. The terminal supports the networking mode of the visiting place network. The visited network, i.e. the network in which the terminal currently applies for registration, here, may be, for example, a network setup mode shown in fig. 1, i.e. an SA network. The present application is not limited as to whether the visited place has other networks. For example, if the visited network is a SA network, the visited may also support, for example, a 5G NSA and/or 4G network. The registration request message carries an identification of the home network of the terminal. The home network identity referred to herein is the home public land mobile network (Public Land Mobile Network, PLMN) identity.
The type of the access management network element is related to the visited network, for example, if the visited network is an SA network, the access management network element may be an AMF network element.
In this step, the terminal sends a registration request message to the visited access management network element to register to the visited network, so that the subsequent terminal can communicate through the visited network. The terminal, for example, first sends a registration request message to the visited base station, which may be a gNB for example, and then forwards the registration request message by the visited base station to the visited access management network element.
Correspondingly, the visiting place access management network element receives the registration request message sent by the terminal.
S102, the access management network element judges whether the identification of the home network exists in a home network list of a networking mode which does not support the visiting network.
The access management network element stores a home network list of a networking mode which does not support the visiting place network, and home identifiers of the networking mode which does not support the visiting place network are recorded in the list. In this step, the access management network element determines whether the identifier of the home network exists in a home network list of a networking mode that does not support the visited network, and further determines whether the terminal has permission to register with the visited network.
If the identifier of the home network does not exist in the home network list of the networking modes that do not support the visited network, it indicates that the terminal of the home network may be the first attempt to access the visited network, or the home network supports the networking modes of the visited network, so that further judgment is needed, step S103 is executed.
Optionally, if the identifier of the home network exists in the home network list of the networking mode that does not support the visited network, which indicates that the terminal does not have permission to register to the visited network for communication, step S107 is executed.
S103, the access management network element sends a discovery request message to the network storage network element of the visit area network roaming gateway, wherein the discovery request message carries the identification of the home area network.
The type of the network storage network element is related to the visited network, for example, if the visited network is an SA network, the network storage network element may be an NRF network element. In this step, the access management network element sends a discovery request message to the network storage network element of the visited network roaming gateway, so as to request to discover the network element for performing registration authority authentication, specifically related to the visited network, and if the visited network is an SA network, the network element may be an AUSF network element, for example.
Correspondingly, the network storage network element of the visit network diffuse entrance gateway receives the discovery request message sent by the access management network element of the visit network.
S104, the network storage network element determines whether the home network supports the networking mode of the visiting place network.
In this step, the network storage network element determines whether the home network supports the networking mode of the visited network, and further determines whether the terminal has permission to register to the visited network.
The network storage network element may for example look up the address of the network storage network element of the home network of the terminal itself. If so, indicating that the home network of the terminal supports the networking mode of the visiting network; if the network is not configured, the home network of the terminal does not support the networking mode of the visiting network.
If not, the terminal is not authorized to register to the visiting place network, and step S105 is executed.
S105, the network storage network element returns a discovery response message to the access management network element.
The discovery response message is used for indicating a networking mode that the home network does not support the visited network.
For example, the discovery response message may include an error code, and, therefore, a home network identification. The present application is not limited to the manner in which the error code is characterized. And indicating the networking mode that the home network does not support the visiting place network by finding an error code in the response message and the home network identification.
Correspondingly, the access management network element receives a discovery response message returned by the network storage network element.
And S106, the access management network element adds the home network to a home network list of a networking mode which does not support the visiting network according to the discovery response message.
In this step, the access management network element adds the home network to the home network list of the networking mode that does not support the visited network according to the discovery response message, and then if the terminal or other terminals of the home network that are the home network where the terminal is located try to register to the visited network later, the access management network element can directly return a registration rejection message to the terminal that tries to register according to the home network list of the networking mode that does not support the visited network, without sending the discovery request message to the network storage network element of the visited network roaming gateway, so as to authenticate whether the terminal of the home network has permission to access to the visited network. By the method, unnecessary communication signaling can be saved, occupation of communication resources by the unnecessary communication signaling is reduced, network communication performance can be improved, and user communication experience is improved.
S107, the access management network element returns a registration rejection message to the terminal.
In this step, the access management network element returns a registration rejection message to the terminal, so that the terminal learns that it has no authority to register to the visited network. Alternatively, if the visited place also supports other communication networks than the target network, the terminal may attempt to register with other communication networks, such as a 4G network.
It should be understood that the present application is not limited to the order of execution of steps S106 and S107, and may be executed in parallel.
Correspondingly, the terminal receives a registration rejection message returned by the access management network element.
In this embodiment, first, a terminal sends a registration request message to a visited access management network element; then, the access management network element judges whether the identification of the home network exists in a home network list of a networking mode which does not support the visiting network; if not, the access management network element sends a discovery request message to the network storage network element of the visit area network diffuse access gateway; subsequently, the network storage network element determines whether the home network supports the networking mode of the visiting place network, if not, the network storage network element returns a discovery response message to the access management network element; subsequently, the access management network element adds the home network to a home network list of a networking mode which does not support the visiting network according to the discovery response message, and returns a registration rejection message to the terminal.
Because the visiting place access management network element stores the home network list of the networking mode which does not support the visiting place network, when the terminal tries to register to the visiting place network, the access management network element can directly judge whether the terminal has qualification of registering to the visiting place network according to the list, namely, whether the home place of the terminal supports the target network. And when the home location of the terminal exists in the home network category of the networking mode which does not support the visiting place network, the registration rejection message can be directly fed back to the terminal without executing communication signaling transmission between the visiting place access management network element and the visiting place diffuse access gateway. That is, by the method, when the terminal belongs to the area without supporting the visiting area network and tries to access the visiting area network, unnecessary transmission of communication signaling is reduced, occupation of communication resources is further reduced, influence on communication indexes and communication performance is reduced, and user experience is further improved. When the access control method provided by the application is applied to a roaming scene that the home location of the terminal does not support the SA network and the visiting location supports the SA network, the redundancy of communication signaling caused by repeatedly trying to access the visiting location SA network by the terminal can be avoided, and the performance can be improved.
In addition, the configuration of the visited place access management network element is not realized in a manual configuration mode, but the configuration of the home network list of the home network which does not support the networking mode of the home network is directly and automatically realized through the visited place access management network element according to the discovery response message sent by the visited place diffuse entry gateway, so that the waste of human resources caused by manually configuring the visited place access management network element can be avoided in the mode, and the operation is simple, convenient and quick.
Optionally, in the foregoing embodiment, the registration reject message may further carry indication information, where the indication information is used to instruct the terminal to stop initiating the registration request to the visited network.
Since the home network of the terminal itself does not support the visited network, it is not successful even if the terminal subsequently continues to attempt to register to the visited network. Therefore, if the registration rejection message also carries the indication information, the terminal can be enabled to stop initiating the registration request to the visiting network subsequently, so that the transmission of unnecessary communication signaling between the terminal and the visiting access management network element can be further reduced on the basis of the embodiment, the occupation of unnecessary communication resources is reduced, the network communication performance is further improved, and the user communication experience is improved.
Optionally, the access management network element may further automatically update a home network list of a networking mode that does not support the visited network according to a home network condition of the terminal. Specifically, fig. 4 is a flow chart of a second access control method provided in the present application, as shown in fig. 4, the method may include the following steps:
s201, the access management network element sends a subscription request to the network storage network element.
The subscription request is used for requesting to subscribe to change information of a networking mode of the home network supporting the visiting network.
In this step, the access management network element sends a subscription request to the network storage network element, so that the access management network element can learn the change information in time later if the home network of the terminal supports the networking mode of the visited network.
Correspondingly, the network storage network element receives the subscription request message sent by the access management network element.
The subscription response carries the change information. That is, if the network storage network element configures a change in the network configuration of the home network, the network storage network element will automatically send a subscription response to the access management network element so that it learns the change information.
Correspondingly, the access management network element receives a subscription response returned by the network storage network element.
S203, the access management network element deletes the home network from a home network list of a networking mode which does not support the visiting network.
In this step, since the access management network element receives the subscription response returned by the network storage network element, the access management network element can find the home network identifier corresponding to the subscription response from the home network list of the networking mode which does not support the visited network according to the subscription response, and delete the home network from the home network list of the networking mode which does not support the visited network. Subsequently, if the terminal of the home network tries to access the visited network, the home network list of the networking mode of the home network is not supported, so that the access management network element sends a discovery request message to the network storage network element to realize subsequent registration request of the terminal of the home network.
In this embodiment, the access management network element sends a subscription request to the network storage network element to request to subscribe to change information of a network mode in which the home network supports the visited network. Subsequently, if the network storage network element configures the home network networking mode to change, the network storage network element sends a subscription response to the access management network element to instruct the access management network element to delete the home network from the home network list which does not support the home network networking mode. By the method, the home network list of the networking mode of the visiting place network which is not supported by the visiting place access management network element can be automatically updated, the operation is convenient, and the usability of the access control method provided by the application is further improved.
In addition to reducing unnecessary signaling transmission when the terminal of the home network which does not support the visited network tries to access the visited network, the terminal side control can also reduce the unnecessary signaling transmission. The following description will be made by way of specific embodiments, and the same or similar contents as those of the above embodiments may be referred to the above embodiments, and will not be repeated herein.
Fig. 5 is a flow chart of a third access control method provided in the present application, as shown in fig. 5, the method includes the following steps:
s301, the terminal sends a registration request message to an access management network element of the visiting place network.
The registration request message carries an identification of the home network of the terminal. The terminal supports the networking mode of the visiting place network.
Correspondingly, the access management network element receives a registration request message sent by the terminal.
S302, the access management network element sends a discovery request message to the network storage network element of the visiting place network, wherein the discovery request message carries the identification of the home network.
In this step, the access management network element directly sends a discovery request message to the network storage network element of the visited network to request discovery of the network element for registering the permission of the visited network to the terminal.
Correspondingly, the network storage network element receives the discovery request message sent by the access management network element.
S303, the network storage network element determines whether the home network supports the networking mode of the visiting place network.
If not, the terminal is not authorized to register to the visiting place network, and step S204 is executed.
S304, the network storage network element returns a discovery response message to the access management network element.
The discovery response message is used to indicate that the home network does not support the networking mode of the visited network.
Correspondingly, the access management network element receives a discovery response message returned by the network storage network element.
And S305, the access management network element returns a registration rejection message to the terminal according to the discovery response message.
The registration rejection message carries indication information, which is used for indicating the terminal to stop initiating the registration request to the visiting network.
Correspondingly, the terminal receives a registration rejection message returned by the access management network element.
S306, the terminal stops initiating the registration request to the visiting place network according to the indication information.
In this step, since the terminal acquires the indication information, the subsequent terminal will not send the registration request message to the access management network element any more, that is, stop initiating the registration request to the visited network.
In this embodiment, first, a terminal sends a registration request message to an access management network element of a visited network; then, the access management network element sends a discovery request message to a network storage network element of the visiting place network; subsequently, the network storage network element returns a discovery response message to the access management network element. The access management network element returns a registration rejection message to the terminal according to the discovery response message; and then, the terminal stops initiating the registration request to the visiting place network according to the indication information. In this way, after any terminal whose home network does not support the visited network fails to attempt to register to the visited network, the terminal and any other terminals of the home network will not attempt to register to the visited network again. That is, in this way, when the terminal belongs to the area where the terminal does not support the visited network and tries to access the visited network, unnecessary transmission of communication signaling between the terminal and the network storage network element of the visited access office is reduced, so that occupation of communication resources is reduced, influence on communication indexes and communication performance is reduced, and user experience is improved.
Fig. 6 is a schematic structural diagram of a first access control device provided in the present application, where, as shown in fig. 6, the device is applied to an access management network element of a visited network, and the device includes: a first acquisition module 11, a transmission module 12, a second receiving module 13, an addition module 14.
A first receiving module 11, configured to receive a registration request message sent by a terminal, where the registration request message carries an identifier of a home network of the terminal; and the terminal supports the networking mode of the visiting place network.
And a sending module 12, configured to send a discovery request message to a network storage network element of the visited network roaming gateway, where the discovery request message carries an identifier of the home network, if the identifier of the home network does not exist in a home network list that does not support a networking manner of the visited network.
A second receiving module 13, configured to receive a discovery response message returned by the network storage network element, where the discovery response message is used to indicate that the home network does not support the networking manner of the visited network.
And the adding module 14 is configured to add the home network to a home network list that does not support the networking mode of the visited network according to the discovery response message, and return a registration rejection message to the terminal.
Optionally, the sending module 12 is further configured to return a registration rejection message to the terminal if the identifier of the home network exists in the home network list that does not support the networking manner of the visited network.
Optionally, the registration rejection message carries indication information, where the indication information is used to instruct the terminal to stop initiating a registration request to the visited network.
Optionally, the sending module 12 is further configured to send a subscription request to the network storage network element, where the subscription request is used to request to subscribe to change information of a networking mode that the home network supports the visited network; and if a subscription response returned by the network storage network element is received, deleting the home network from the home network list of the networking mode which does not support the visiting network, wherein the subscription response carries the change information.
The access control device provided in this embodiment may execute the access control method executed by the access management network element in the above method embodiment, and its implementation principle and technical effect are similar, and are not described herein again. The division of the modules shown in fig. 6 is merely an illustration, and the present application does not limit the division of the modules and the naming of the modules.
Fig. 7 is a schematic structural diagram of a second access control device provided in the present application, where the device is applied to an access management network element of a visited network, and the device includes: a receiving module 21, a transmitting module 22, a second receiving module 23, a returning module 24.
A receiving module 21, configured to receive a registration request message sent by a terminal, where the registration request message carries an identifier of a home network of the terminal; and the terminal supports the networking mode of the visiting place network.
A sending module 22, configured to send a discovery request message to a network storage network element of the visited network, where the discovery request message carries an identifier of the home network.
A second receiving module 23, configured to receive a discovery response message returned by the network storage network element, where the discovery response message is used to indicate that the home network does not support the networking manner of the visited network.
A return module 24, configured to return a registration rejection message to the terminal according to the discovery response message; the registration rejection message carries indication information, and the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network.
The access control device provided in this embodiment may execute the access control method executed by the access management network element in the above method embodiment, and its implementation principle and technical effect are similar, and are not described herein again. The division of the modules shown in fig. 7 is merely an illustration, and the present application does not limit the division of the modules and the naming of the modules.
Fig. 8 is a schematic structural diagram of a third access control device provided in the present application, where the device is applied to a terminal, and the terminal supports a networking manner of a visited network, and the device includes: a transmitting module 31, a receiving module 32, and an initiating module 33.
A sending module 31, configured to send a registration request message to an access management network element of the visited network, where the registration request carries an identifier of a home network of the terminal.
A receiving module 32, configured to receive a registration rejection message returned by the access management network element; the registration rejection message carries indication information, and the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network.
And the initiating module 33 is configured to stop initiating a registration request to the visited network according to the indication information.
The access control device provided in this embodiment may execute the access control method executed by the terminal in the above method embodiment, and its implementation principle and technical effect are similar, and are not described herein again. The division of the modules shown in fig. 8 is merely an illustration, and the present application does not limit the division of the modules and the naming of the modules.
Fig. 9 is a schematic structural diagram of a fourth access control device provided in the present application, where the device is applied to a network storage network element of a visited network, and the device includes: a receiving module 41, a determining module 42, a returning module 43. Optionally, the apparatus may also include a subscription module 44.
A receiving module 41, configured to receive a discovery request message sent by an access management network element of the visited network, where the discovery request message is triggered when the access management network element receives a registration request message sent by a terminal, where the discovery request message carries an identifier of a home network of the terminal carried in the registration request message, and the terminal supports a networking manner of the visited network.
A determining module 42 is configured to determine whether the home network supports the networking mode of the visited network.
And a returning module 43, configured to return, if not, a discovery response message to the access management network element, where the discovery response message is used to indicate that the home network does not support the networking manner of the visited network.
Optionally, a subscription module 44, configured to receive a subscription request sent by the access management network element, where the subscription request is used to request to subscribe to change information of a networking manner that the home network supports the visited network; and when the home network supports the networking mode of the visiting network, sending a subscription response to the access management network element, wherein the subscription response is used for indicating the change information.
The access control device provided in this embodiment may execute the access control method executed by the network storage network element in the above method embodiment, and its implementation principle and technical effect are similar, and are not described herein again. The division of the modules shown in fig. 9 is merely an illustration, and the present application does not limit the division of the modules and the naming of the modules.
Fig. 10 is a schematic structural diagram of a communication device 100 provided in the present application. As shown in fig. 10, the communication apparatus may include: at least one processor 101, a memory 102, a communication interface 103.
A memory 102 for storing a program. In particular, the program may include program code including computer-operating instructions.
The memory 102 may comprise high-speed RAM memory or may further comprise non-volatile memory (non-volatile memory), such as at least one disk memory.
The processor 101 is configured to execute computer-executable instructions stored in the memory 102 to implement the access control method described in the foregoing method embodiments. The processor 101 may be a central processing unit (Central Processing Unit, abbreviated as CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, abbreviated as ASIC), or one or more integrated circuits configured to implement embodiments of the present application.
The communication device 100 may also interact with external devices, such as terminal devices (e.g., cell phones, tablet computers) through the communication interface 103. In a specific implementation, if the communication interface 103, the memory 102, and the processor 101 are implemented independently, the communication interface 103, the memory 102, and the processor 101 may be connected to each other and perform communication with each other through buses. The bus may be an industry standard architecture (Industry Standard Architecture, abbreviated ISA) bus, an external device interconnect (Peripheral Component, abbreviated PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated EISA) bus, among others. Buses may be divided into address buses, data buses, control buses, etc., but do not represent only one bus or one type of bus.
Alternatively, in a specific implementation, if the communication interface 103, the memory 102, and the processor 101 are integrated on a chip, the communication interface 103, the memory 102, and the processor 101 may complete communication through internal interfaces.
The present application also provides a computer-readable storage medium, which may include: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, etc., in which program codes can be stored, and specifically, the computer-readable storage medium stores therein program instructions for the access control method in the above-described embodiment.
The present application also provides a computer program product comprising execution instructions stored in a readable storage medium. The at least one processor of the electronic device may read the execution instructions from the readable storage medium, and execution of the execution instructions by the at least one processor causes the electronic device to implement the access control method provided by the various embodiments described above.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. An access control method, wherein the method is applied to an access management network element of a visited network, the method comprising:
receiving a registration request message sent by a terminal, wherein the registration request message carries an identifier of a home network of the terminal; the terminal supports a networking mode of the visiting place network;
if the identifier of the home network does not exist in the home network list which does not support the networking mode of the visiting network, sending a discovery request message to a network storage network element of the visiting network roaming gateway, wherein the discovery request message carries the identifier of the home network;
receiving a discovery response message returned by the network storage network element, wherein the discovery response message is used for indicating that the home network does not support the networking mode of the visiting network;
and adding the home network to a home network list of a networking mode which does not support the visiting network according to the discovery response message, and returning a registration rejection message to the terminal.
2. The method according to claim 1, wherein the method further comprises:
and if the identifier of the home network exists in the home network list which does not support the networking mode of the visiting network, returning a registration rejection message to the terminal.
3. A method according to claim 1 or 2, wherein the registration reject message carries indication information for instructing the terminal to stop initiating registration requests to the visited network.
4. The method according to claim 1 or 2, characterized in that the method further comprises:
sending a subscription request to the network storage network element, wherein the subscription request is used for requesting to subscribe the change information of the networking mode of the home network supporting the visiting network;
and if a subscription response returned by the network storage network element is received, deleting the home network from the home network list of the networking mode which does not support the visiting network, wherein the subscription response carries the change information.
5. An access control method, wherein the method is applied to an access management network element of a visited network, the method comprising:
receiving a registration request message sent by a terminal, wherein the registration request message carries an identifier of a home network of the terminal; the terminal supports a networking mode of the visiting place network;
sending a discovery request message to a network storage network element of the visiting network, wherein the discovery request message carries an identifier of the home network;
Receiving a discovery response message returned by the network storage network element, wherein the discovery response message is used for indicating that the home network does not support the networking mode of the visiting network;
returning a registration rejection message to the terminal according to the discovery response message; the registration rejection message carries indication information, and the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network.
6. An access control method, which is characterized in that the method is applied to a terminal, the terminal supports a networking mode of a visiting place network, and the method comprises the following steps:
sending a registration request message to an access management network element of a visiting place network, wherein the registration request carries an identifier of a home network of the terminal;
receiving a registration rejection message returned by the access management network element; the registration rejection message carries indication information, wherein the indication information is used for indicating the terminal to stop initiating a registration request to the visiting network;
and stopping initiating a registration request to the visiting place network according to the indication information.
7. An access control method, characterized in that the method is applied to a network storage network element of a visited network, the method comprising:
Receiving a discovery request message sent by an access management network element of the visiting place network, wherein the discovery request message is triggered when the access management network element receives a registration request message sent by a terminal, the discovery request message carries an identifier of a home network of the terminal carried in the registration request message, and the terminal supports a networking mode of the visiting place network;
determining whether the home network supports a networking mode of the visiting network;
and if not, returning a discovery response message to the access management network element, wherein the discovery response message is used for indicating that the home network does not support the networking mode of the visiting network.
8. The method of claim 7, wherein the method further comprises:
receiving a subscription request sent by the access management network element, wherein the subscription request is used for requesting to subscribe to change information of a networking mode of the home network supporting the visitor network;
and when the home network supports the networking mode of the visiting network, sending a subscription response to the access management network element, wherein the subscription response is used for indicating the change information.
9. A communication device, the communication device comprising:
a processor, and a memory and a communication interface which are in communication connection with the processor;
the memory stores computer-executable instructions;
the processor executes computer-executable instructions stored in the memory to implement the method of any one of claims 1 to 8.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to implement the access control method of any of claims 1 to 8.
CN202311371904.0A 2023-10-20 2023-10-20 Access control method, communication device and storage medium Pending CN117676537A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311371904.0A CN117676537A (en) 2023-10-20 2023-10-20 Access control method, communication device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311371904.0A CN117676537A (en) 2023-10-20 2023-10-20 Access control method, communication device and storage medium

Publications (1)

Publication Number Publication Date
CN117676537A true CN117676537A (en) 2024-03-08

Family

ID=90081505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311371904.0A Pending CN117676537A (en) 2023-10-20 2023-10-20 Access control method, communication device and storage medium

Country Status (1)

Country Link
CN (1) CN117676537A (en)

Similar Documents

Publication Publication Date Title
CN108632808B (en) Core network control plane device selection method and device
US11139887B2 (en) System and method for radio link sharing
CN109845360B (en) Communication method and device
CN114615023A (en) Communication method and related device
CN111031538B (en) Authentication method and device
JP7099536B2 (en) Core network equipment, communication terminals, core network equipment methods, programs, and communication terminal methods
CN110049578B (en) Wireless connection modification method, device and system
KR20230004708A (en) Device Interaction Method and Core Network Device
US12047424B2 (en) IMS support for non-voice services
KR101460766B1 (en) Security setting system and the control method for using clurster function in Wireless network system
CN116711382A (en) Method and user equipment for handling communications in a satellite communications network
CN108243631B (en) Network access method and equipment
CN116390203A (en) Method and device for selecting network
CN117082612B (en) Cluster type control method and device for motor
CN113454929A (en) Information processing method and device, communication equipment and storage medium
CN115299168A (en) Method and apparatus for handover
CN114916037A (en) Communication method and device
CN114642031A (en) Communication system and method of operating a communication system
CN113411815A (en) Method and device for accessing network slice
EP4224930A1 (en) Support of service continuity for home-routed pdu session when there is no n14 interface between source network and target network
CN117676537A (en) Access control method, communication device and storage medium
CN115136663A (en) System and method for authorizing IAB node connection based on IAB node identification information
CN117221884B (en) Base station system information management method and system
WO2024183604A1 (en) Communication method and communication apparatus
CN113993130B (en) Terminal access control method, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination